[SRU Hirsute, Focal/linux-oem-5.10, Groovy, Focal/linux-oem-5.6, Focal, Bionic 0/4] CVE-2021-27363, CVE-2021-27364, CVE-2021-27365
Thadeu Lima de Souza Cascardo
cascardo at canonical.com
Thu Mar 11 02:36:12 UTC 2021
[Impact]
Unprivileged users can use the iscsi_transport handle to leak kernel address,
create/close iscsi sessions, and write out of bonds when reading sysfs iscsi
attributes.
[Fix/Backport]
3 commits fix the problem, minimal backporting was needed because of missing
commit 82b8cf40bfe1, but the commit that introduces sysfs_emit was needed from
4.15 to 5.8, and needed some context adjustment on 4.15 because of missing
*change_owner functions.
[Test case]
Leaking the address by reading /sys/class/iscsi_transport/tcp/handle was not
possible anymore. Also, creating a session also failed, and even as root,
setting a name larger than PAGE_SIZE failed.
[Potential regression]
iscsi users could fail to operate as unprivileged users.
Chris Leech (2):
scsi: iscsi: Verify lengths on passthrough PDUs
scsi: iscsi: Ensure sysfs attributes are limited to PAGE_SIZE
Joe Perches (1):
sysfs: Add sysfs_emit and sysfs_emit_at to format sysfs output
Lee Duncan (1):
scsi: iscsi: Restrict sessions and handles to admin capabilities
Documentation/filesystems/sysfs.txt | 8 +-
drivers/scsi/libiscsi.c | 148 ++++++++++++++--------------
drivers/scsi/scsi_transport_iscsi.c | 39 ++++++--
fs/sysfs/file.c | 55 +++++++++++
include/linux/sysfs.h | 16 +++
5 files changed, 178 insertions(+), 88 deletions(-)
--
2.27.0
More information about the kernel-team
mailing list